uniquelyparticular/sync-moltin-to-zendesk

WS-2019-0493 (High) detected in handlebars-4.1.2.tgz

mend-bolt-for-github opened this issue · 0 comments

WS-2019-0493 - High Severity Vulnerability

Vulnerable Library - handlebars-4.1.2.tgz

Handlebars provides the power necessary to let you build semantic templates effectively with no frustration

Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz

Path to dependency file: sync-moltin-to-zendesk/package.json

Path to vulnerable library: sync-moltin-to-zendesk/node_modules/handlebars/package.json

Dependency Hierarchy:

  • semantic-release-15.13.18.tgz (Root Library)
    • release-notes-generator-7.2.1.tgz
      • conventional-changelog-writer-4.0.3.tgz
        • handlebars-4.1.2.tgz (Vulnerable Library)

Found in HEAD commit: 472f7d213979ba5d40d01b31ee5775d75e8ec8ab

Vulnerability Details

handlebars before 3.0.8 and 4.x before 4.5.2 is vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system.

Publish Date: 2019-11-14

URL: WS-2019-0493

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/1316

Release Date: 2019-11-14

Fix Resolution: handlebars - 3.0.8,4.5.2


Step up your Open Source Security Game with WhiteSource here